- Apr 01, 2016
-
-
Daniel Stenberg authored
So that we only do the extra typedefs in curl_memory.h when we really need to and avoid double typedefs. follow-up commit to 7218b52c Thanks-to: Steve Holme
-
- Mar 31, 2016
-
-
Diego Bes authored
Supports HTTP/2 over clear TCP - Optimize switching to HTTP/2 by removing calls to init and setup before switching. Switching will eventually call setup and setup calls init. - Supports new version to “force” the use of HTTP/2 over clean TCP - Add common line parameter “--http2-prior-knowledge” to the Curl command line tool.
-
- Feb 24, 2016
-
-
Jay Satiro authored
The two options are almost the same, except in the case of OpenSSL: CURLINFO_TLS_SESSION OpenSSL session internals is SSL_CTX *. CURLINFO_TLS_SSL_PTR OpenSSL session internals is SSL *. For backwards compatibility we couldn't modify CURLINFO_TLS_SESSION to return an SSL pointer for OpenSSL. Also, add support for the 'internals' member to point to SSL object for the other backends axTLS, PolarSSL, Secure Channel, Secure Transport and wolfSSL. Bug: https://github.com/curl/curl/issues/234 Reported-by: <dkjjr89@users.noreply.github.com> Bug: https://curl.haxx.se/mail/lib-2015-09/0127.html Reported-by: Michael König
-
- Feb 23, 2016
-
-
Michael Koenig authored
Some TFTP server implementations ignore the "TFTP Option extension" (RFC 1782-1784, 2347-2349), or implement it in a flawed way, causing problems with libcurl. Another switch for curl_easy_setopt "CURLOPT_TFTP_NO_OPTIONS" is introduced which prevents libcurl from sending TFTP option requests to a server, avoiding many problems caused by faulty implementations. Bug: https://github.com/curl/curl/issues/481
-
- Feb 03, 2016
-
-
Dan Fandrich authored
-
- Feb 02, 2016
-
-
Daniel Stenberg authored
-
- Dec 13, 2015
-
-
Daniel Stenberg authored
... and stick to 1.1 for HTTP. This is in line with what browsers do and should have very little risk.
-
- Dec 07, 2015
-
-
Gisle Vanem authored
The name of the header guard in lwIP's <lwip/opt.h> has changed from '__LWIP_OPT_H__' to 'LWIP_HDR_OPT_H' (bug #35874 in May 2015). Other fixes: - In curl_setup.h, the problem with an old PSDK doesn't apply if lwIP is used. - In memdebug.h, the 'socket' should be undefined first due to lwIP's lwip_socket() macro. - In curl_addrinfo.c lwIP's getaddrinfo() + freeaddrinfo() macros need special handling because they were undef'ed in memdebug.h. - In select.c we can't use preprocessor conditionals inside select if MSVC and select is a macro, as it is with lwIP. http://curl.haxx.se/mail/lib-2015-12/0023.html http://curl.haxx.se/mail/lib-2015-12/0024.html
-
Gisle Vanem authored
-
- Nov 19, 2015
-
-
Patrick Monnerat authored
-
- Nov 13, 2015
-
-
Daniel Stenberg authored
As an alias for OBJECTPOINT. Provided to allow us to grep for all string options easier.
-
- Nov 02, 2015
-
-
Daniel Stenberg authored
Closes #425
-
- Oct 31, 2015
-
-
Daniel Stenberg authored
Fixes a name space pollution at the cost of programs using one of these defines will no longer compile. However, the vast majority of libcurl programs that do multipart formposts use curl_formadd() to build this list. Closes #506
-
- Oct 23, 2015
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
CURLOPT_STREAM_DEPENDS CURLOPT_STREAM_DEPENDS_E CURLOPT_STREAM_PRIORITY
-
- Oct 20, 2015
-
-
Jonas Minnberg authored
closes #496
-
- Aug 24, 2015
-
-
Razvan Cojocaru authored
This patch addresses known bug #76, where on 64-bit Windows SOCKET is 64 bits wide, but long is only 32, making CURLINFO_LASTSOCKET unreliable. Signed-off-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
-
- Aug 23, 2015
-
-
Nathaniel Waisbrot authored
- Add new option CURLOPT_DEFAULT_PROTOCOL to allow specifying a default protocol for schemeless URLs. - Add new tool option --proto-default to expose CURLOPT_DEFAULT_PROTOCOL. In the case of schemeless URLs libcurl will behave in this way: When the option is used libcurl will use the supplied default. When the option is not used, libcurl will follow its usual plan of guessing from the hostname and falling back to 'http'.
-
- Jul 17, 2015
-
-
Jay Satiro authored
New tool option --ssl-no-revoke. New value CURLSSLOPT_NO_REVOKE for CURLOPT_SSL_OPTIONS. Currently this option applies only to WinSSL where we have automatic certificate revocation checking by default. According to the ssl-compared chart there are other backends that have automatic checking (NSS, wolfSSL and DarwinSSL) so we could possibly accommodate them at some later point. Bug: https://github.com/bagder/curl/issues/264 Reported-by: zenden2k <zenden2k@gmail.com>
-
- Jun 05, 2015
-
-
Daniel Stenberg authored
The protocol is named "HTTP/2" after all. It is an alias for the existing CURL_HTTP_VERSION_2_0 enum.
-
- May 18, 2015
-
-
Daniel Stenberg authored
By setting this option to 1 libcurl will wait for a connection to reveal if it is possible to pipeline/multiplex on before it continues.
-
- Apr 28, 2015
-
-
Linus Nielsen authored
* Add new options, CURLOPT_PROXY_SERVICE_NAME and CURLOPT_SERVICE_NAME. * Add new curl options, --proxy-service-name and --service-name.
-
- Mar 24, 2015
-
-
Daniel Stenberg authored
--path-as-is is the command line option Added docs in curl.1 and CURLOPT_PATH_AS_IS.3 Added test in test 1241
-
- Mar 20, 2015
-
-
Alessandro Ghedini authored
This option can be used to enable/disable TLS False Start defined in the RFC draft-bmoeller-tls-falsestart.
-
- Jan 16, 2015
-
-
Alessandro Ghedini authored
This option can be used to enable/disable certificate status verification using the "Certificate Status Request" TLS extension defined in RFC6066 section 8. This also adds the CURLE_SSL_INVALIDCERTSTATUS error, to be used when the certificate status verification fails, and the Curl_ssl_cert_status_request() function, used to check whether the SSL backend supports the status_request extension.
-
- Jan 15, 2015
-
-
Yun SangHo authored
-
- Dec 27, 2014
-
-
Steve Holme authored
For consistency, as we seem to have a bit of a mixed bag, changed all instances of ipv4 and ipv6 in comments and documentations to use the correct case.
-
- Dec 26, 2014
-
-
Steve Holme authored
Use Unix when generically writing about Unix based systems as UNIX is the trademark and should only be used in a particular product's name.
-
- Dec 04, 2014
-
-
Anthon Pang authored
It returns error for >= 400 HTTP responses. Bug: https://github.com/bagder/curl/pull/129
-
Peter Wu authored
The ability to do HTTP requests over a UNIX domain socket has been requested before, in Apr 2008 [0][1] and Sep 2010 [2]. While a discussion happened, no patch seems to get through. I decided to give it a go since I need to test a nginx HTTP server which listens on a UNIX domain socket. One patch [3] seems to make it possible to use the CURLOPT_OPENSOCKETFUNCTION function to gain a UNIX domain socket. Another person wrote a Go program which can do HTTP over a UNIX socket for Docker[4] which uses a special URL scheme (though the name contains cURL, it has no relation to the cURL library). This patch considers support for UNIX domain sockets at the same level as HTTP proxies / IPv6, it acts as an intermediate socket provider and not as a separate protocol. Since this feature affects network operations, a new feature flag was added ("unix-sockets") with a corresponding CURL_VERSION_UNIX_SOCKETS macro. A new CURLOPT_UNIX_SOCKET_PATH option is added and documented. This option enables UNIX domain sockets support for all requests on the handle (replacing IP sockets and skipping proxies). A new configure option (--enable-unix-sockets) and CMake option (ENABLE_UNIX_SOCKETS) can disable this optional feature. Note that I deliberately did not mark this feature as advanced, this is a feature/component that should easily be available. [0]: http://curl.haxx.se/mail/lib-2008-04/0279.html [1]: http://daniel.haxx.se/blog/2008/04/14/http-over-unix-domain-sockets/ [2]: http://sourceforge.net/p/curl/feature-requests/53/ [3]: http://curl.haxx.se/mail/lib-2008-04/0361.html [4]: https://github.com/Soulou/curl-unix-socket Signed-off-by: Peter Wu <peter@lekensteyn.nl>
-
- Nov 29, 2014
-
-
Bill Nagel authored
Added the necessary protocol and port definitions in order to support SMB/CIFS.
-
- Nov 07, 2014
-
-
Steve Holme authored
As the list has gotten a little messy and hard to read, especially with the introduction of deprecated items, aligned the values and comments into clean columns and reworked some of the comments in the process.
-
Steve Holme authored
-
- Nov 02, 2014
-
-
Steve Holme authored
Support for Kerberos V4 was removed in v7.33.0.
-
- Oct 13, 2014
-
-
Patrick Monnerat authored
-
- Oct 07, 2014
-
-
Travis Burtrum authored
Option --pinnedpubkey takes a path to a public key in DER format and only connect if it matches (currently only implemented with OpenSSL). Provides CURLOPT_PINNEDPUBLICKEY for curl_easy_setopt(). Extract a public RSA key from a website like so: openssl s_client -connect google.com:443 2>&1 < /dev/null | \ sed -n '/-----BEGIN/,/-----END/p' | openssl x509 -noout -pubkey \ | openssl rsa -pubin -outform DER > google.com.der
-
- Jul 31, 2014
-
-
Daniel Stenberg authored
Each backend now defines CURL_SSL_BACKEND accordingly. Added the *AXTLS one which was missing previously.
-
- Jul 28, 2014
-
-
Anthon Pang authored
Removing defines, even obsolete ones that haven't been used for a very long time, still break a lot of applications. Bug: https://github.com/bagder/curl/pull/106
-
- Jul 23, 2014
-
-
Daniel Stenberg authored
1 - fixes the warnings when built without http2 support 2 - adds CURLE_HTTP2, a new error code for errors detected by nghttp2 basically when they are about http2 specific things.
-
- Jul 22, 2014
-
-
Michael Osipov authored
- Replace CURLAUTH_GSSNEGOTIATE with CURLAUTH_NEGOTIATE - CURL_VERSION_GSSNEGOTIATE is deprecated which is served by CURL_VERSION_SSPI, CURL_VERSION_GSSAPI and CURUL_VERSION_SPNEGO now. - Remove display of feature 'GSS-Negotiate'
-